Implementing Biometric Security - Couverture souple

Chirillo, John

 
9780764525025: Implementing Biometric Security

Synopsis

Biometrics authentication, which relies on fingerprints, speech, or other physical characteristics, is an increasingly important means of protecting critical data Gives security professionals specific guidelines, applications, and procedures for implementing a biometric security system in a LAN, WAN, or wireless infrastructure Covers fingerprint identification, hand geometry, speaker recognition, face location, retina scanning, and multibiometrics Companion Web site contains articles, papers, source code, and product guides

Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.

Quatrième de couverture

Get the specific guidelines, applications, and procedures for implementing a biometric security system straight from the experts

As threats to vital data grow ever more complex, maintaining reliable security measures stands at the top of every network administrator’s critical list. In this first–ever book on applied biometrics, renowned expert and Hack Attacks author John Chirillo joins security professional Scott Blaul to deliver the explanations and hands–on examples you need to understand, implement, and apply security authentication methods that rely on fingerprints, retinal scans, speech patterns, even facial thermography. It’s your indispensable guide to setting up and maintaining a biometric security system in a LAN, WAN, or wireless infrastructure.

You’ll learn how to:

  • Assess your situation and determine the most effective form of biometric security to meet your organization’s needs
  • Compare and choose among fingerprint identification, hand geometry, speaker recognition, face location, and retinal scanning
  • Explore and understand the challenges of multibiometrics
  • Comprehend how verification differs from identification and the role biometrics can play in both processes
  • Determine appropriate guidelines and procedures for implementing a biometric security system
  • Understand the overall strengths and weaknesses of various biometric technologies
  • Develop a template for your own practical security applications

The companion Web site provides source code and articles to increase your knowledge of biometrics and help you choose appropriate security methods.

Biographie de l'auteur

JOHN CHIRILLO is a nationally recognized authority on computer security who has conducted award–winning security audits for Fortune 1000 companies. He is the author of Hack Attacks Revealed, Hack Attacks Denied, Hack Attacks Encyclopedia, and other computer security resources.

SCOTT BLAUL is Director and General Manager of Professional Services at ValCom and a former technical trainer for the US Marine Corps. He has created numerous professional training materials and has extensive experience with storage, SANs, and security vulnerabilities.

Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.